Please turn on your JavaScript for this page to function normally.
Android
Rooting malware lurking in third party Android app stores

Downloading Android apps from Google Play might not always be a safe proposition, but downloading them from third party app stores is definitely less safer. According to Trend …

Broken glass
Flaw in Sparkle Updater for Mac opens users of popular apps to system compromise

A security engineer has recently discovered a serious vulnerability in Sparkle, the widely used open source software update framework for Mac applications, that could be …

Connect
Network forensic analysis tool NetworkMiner 2.0 released

NetworkMiner can be used as a passive network sniffer/packet capturing tool in order to detect operating systems, sessions, hostnames, open ports etc. without putting any …

brain
Harnessing artificial intelligence to build an army of virtual analysts

Enterprises of all types and sizes are continually probed and targeted by cyber attackers. It doesn’t matter whether they are after the company’s or their …

backdoor
Year-old crypto flaw in Socat created a potentially intentional backdoor

A backdoor has been discovered in Socat, a popular open-source network administration tool similar to Netcat, and its unclear how it hasn’t been spotted earlier or at …

labyrinth
“Deliberately hidden” backdoor found on US government’s comms system

Researchers from Austrian infosec outfit SEC Consult have unearthed what they dubbed a “deliberately hidden backdoor account” in NX-1200, a network controller …

measure
OpenWPM: An automated, open source framework for measuring web privacy

Among the speakers at the first ever Privacy Con, organized by the US Federal Trade Commission (FTC) and held last Thursday in Washington, DC, was Steven Englehard, a Ph.D. …

LastPass
LostPass: A worryingly simple phishing attack aimed at LastPass users

Security researcher (and Praesido CTO) Sean Cassidy has demonstrated at ShmooCon how easy it can be for hackers to steal LastPass users’ email, password, and two-factor …

OpenSSH
Flaw allows malicious OpenSSH servers to steal users’ private SSH keys

Qualys researchers have discovered two vulnerabilities in the popular OpenSSH implementation of the secure shell protocol, one of which (CVE-2016-0777) could be exploited by …

Frame
Most companies do nothing to protect their mobile apps

There’s a wide disparity between consumer confidence in the level of security incorporated into mobile health and finance apps and the degree to which organizations …

Bug
Google researchers finds critical flaws in Trend Micro AV solution

If you are using Trend Micro’s Maximum Security 10 solution for Windows, you might want to update it to the latest available version as soon as possible. If you …

PostgreSQL
PostgreSQL 9.5: Row level security, Big Data and UPSERT

PostgreSQL 9.5 adds UPSERT capability, Row Level Security, and multiple Big Data features, which will broaden the user base for the world’s most advanced database. …

Don't miss

Cybersecurity news